The complexities of attack attribution – Week in security with Tony Anscombe Posted on October 5, 2024 As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex affair
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog Security U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds D-Link multiple… rooter April 11, 2024 2 min read 0
Security Affairs newsletter Round 467 by Pierluigi Paganini – INTERNATIONAL EDITION Security A new round of the weekly SecurityAffairs newsletter arrived! Every… rooter April 14, 2024 3 min read 0
Police seized Crimemarket, the largest German-speaking cybercrime marketplace Security German police seized the largest German-speaking cybercrime marketplace Crimemarket and arrested… rooter March 1, 2024 2 min read 0
CISA ADDS ANDROID PIXEL AND SUNHILLO SURELINE BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG Security U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Pixel… rooter March 6, 2024 2 min read 0